SlideShare una empresa de Scribd logo
1 de 21
System safety

System safety, 2013

Slide 1
Safety
• Safety is a property of a system that
reflects the system’s ability to
operate, normally or abnormally, without
danger of causing human injury or death
and without damage to the system’s
environment.
System safety, 2013

Slide 2
Principal dependability
properties

System safety, 2013

Slide 3
Safety criticality
• Primary safety-critical systems
– Embedded software systems whose
failure can cause the associated
hardware to fail and directly threaten
people.

System safety 2013

Slide 4
System safety 2013

Slide 5
• Secondary safety-critical systems
– Systems whose failure results in faults in other
(socio-technical) systems, which can then have
safety consequences.
– For example, a medical records system is safetycritical as failure may lead to inappropriate
treatment being prescribed.
System safety 2013

Slide 6
System safety 2013

Slide 7
Safety and reliability
• Safety and reliability are related but
distinct
• For a system to be safe, it must
generally be reliable
• However, this is not enough. It must
also be safe in the event of system
failure
System safety 2013

Slide 8
• Reliability is concerned with
conformance to a given specification
and delivery of service
• Safety is concerned with ensuring
system cannot cause damage
irrespective of whether or not it
conforms to its specification
System safety 2013

Slide 9
• A reliable system can be unsafe if the
requirements are incorrect or
incomplete

System safety 2013

Slide 10
Unsafe reliable systems

The software on this plane operated ‘reliably’ yet the plane
crashed- covered in a separate video
System safety 2013

Slide 11
Unsafe reliable systems
• There may be dormant faults in a system
that are undetected for many years and
only rarely arise.
• Specification errors
– If the system specification is incorrect then
the system can behave as specified but still
cause an accident.
System safety 2013

Slide 12
• Hardware failures generating spurious inputs
– Hard to anticipate in the specification.

• Context-sensitive commands i.e. issuing the
right command at the wrong time
– Often the result of operator error.

System safety 2013

Slide 13
Accident
• An unplanned event or sequence of events
which results in human death or
injury, damage to property, or to the
environment.
• An overdose of insulin by a softwarecontrolled insulin injection system is an
example of an accident.
System safety 2013

Slide 14
Hazard
• A condition with the potential for causing or
contributing to an accident. A failure of the
sensor that measures blood glucose is an
example of a hazard.

System safety 2013

Slide 15
Damage
•

A measure of the loss resulting from a mishap.
Damage can range from many people being killed as
a result of an accident to minor injury or property
damage.

•

Damage resulting from an overdose of insulin could
be serious injury or the death of the user of the insulin
pump.

System safety 2013

Slide 16
Safety critical systems
development
• Hazard avoidance
– The system is designed so that some
classes of hazard simply cannot arise.

System safety 2013

Slide 17
• Hazard detection and removal
– The system is designed so that hazards are
detected and removed before they result in
an accident.

System safety 2013

Slide 18
• Damage limitation
– The system includes protection features
that minimise the damage that may result
from an accident.

System safety 2013

Slide 19
Summary
• Safety is a property of a system that reflects
the system’s ability to operate, normally or
abnormally, without danger of causing human
injury or death.
• Safety and reliability are related but reliable
systems may be unsafe.
System safety 2013

Slide 20
Summary
• Hazards are conditions that may (but need
not) lead to an accident
• Safety is achieved through
– Hazard avoidance

– Hazard detection and removal
– Damage limitation
System safety 2013

Slide 21

Más contenido relacionado

La actualidad más candente

Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessmentprimeteacher32
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityCarl Ceder
 
Industrial safety (MG University notes)
Industrial safety (MG University notes)Industrial safety (MG University notes)
Industrial safety (MG University notes)George Sebastian
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPTashish kumar
 
FAULT & EVENT TREE ANALYSIS
FAULT & EVENT TREE ANALYSISFAULT & EVENT TREE ANALYSIS
FAULT & EVENT TREE ANALYSISNitesh Dongare
 
Industrial Safety Training by Author Stream
Industrial Safety Training by Author StreamIndustrial Safety Training by Author Stream
Industrial Safety Training by Author StreamAtlantic Training, LLC.
 
Embedded System in Automobiles
Embedded System in Automobiles Embedded System in Automobiles
Embedded System in Automobiles Seminar Links
 
Air pollution monitoring system using mobile gprs sensors array ppt
Air pollution monitoring system using mobile gprs sensors array pptAir pollution monitoring system using mobile gprs sensors array ppt
Air pollution monitoring system using mobile gprs sensors array pptSaurabh Giratkar
 
OHS Risk Assessment and Hierarchy of Control
OHS Risk Assessment and Hierarchy of ControlOHS Risk Assessment and Hierarchy of Control
OHS Risk Assessment and Hierarchy of ControlPECB
 
operation security
operation securityoperation security
operation securityKajalsing23
 
LIST OF IMPORTANT INDIAN STANDARDS ON SAFETY & HEALTH
LIST OF IMPORTANT INDIAN STANDARDS ON SAFETY & HEALTHLIST OF IMPORTANT INDIAN STANDARDS ON SAFETY & HEALTH
LIST OF IMPORTANT INDIAN STANDARDS ON SAFETY & HEALTHBimal Chandra Das
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber SecurityGeo Marian
 
Industrial safety
Industrial safetyIndustrial safety
Industrial safetypsc2015
 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment PresentationLionel Medina
 

La actualidad más candente (20)

Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessment
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information Security
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Industrial safety (MG University notes)
Industrial safety (MG University notes)Industrial safety (MG University notes)
Industrial safety (MG University notes)
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
FAULT & EVENT TREE ANALYSIS
FAULT & EVENT TREE ANALYSISFAULT & EVENT TREE ANALYSIS
FAULT & EVENT TREE ANALYSIS
 
Industrial safety unit i ppt
Industrial safety unit i pptIndustrial safety unit i ppt
Industrial safety unit i ppt
 
Industrial Safety Training by Author Stream
Industrial Safety Training by Author StreamIndustrial Safety Training by Author Stream
Industrial Safety Training by Author Stream
 
Embedded System in Automobiles
Embedded System in Automobiles Embedded System in Automobiles
Embedded System in Automobiles
 
Industrial safety
Industrial safetyIndustrial safety
Industrial safety
 
Industrial safety unit iv ppt
Industrial safety unit iv pptIndustrial safety unit iv ppt
Industrial safety unit iv ppt
 
Air pollution monitoring system using mobile gprs sensors array ppt
Air pollution monitoring system using mobile gprs sensors array pptAir pollution monitoring system using mobile gprs sensors array ppt
Air pollution monitoring system using mobile gprs sensors array ppt
 
OHS Risk Assessment and Hierarchy of Control
OHS Risk Assessment and Hierarchy of ControlOHS Risk Assessment and Hierarchy of Control
OHS Risk Assessment and Hierarchy of Control
 
operation security
operation securityoperation security
operation security
 
LIST OF IMPORTANT INDIAN STANDARDS ON SAFETY & HEALTH
LIST OF IMPORTANT INDIAN STANDARDS ON SAFETY & HEALTHLIST OF IMPORTANT INDIAN STANDARDS ON SAFETY & HEALTH
LIST OF IMPORTANT INDIAN STANDARDS ON SAFETY & HEALTH
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
 
Industrial safety
Industrial safetyIndustrial safety
Industrial safety
 
Safety Management System
Safety Management SystemSafety Management System
Safety Management System
 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment Presentation
 

Destacado

Architectural patterns for real-time systems
Architectural patterns for real-time systemsArchitectural patterns for real-time systems
Architectural patterns for real-time systemssommerville-videos
 
Concepts in Software Safety
Concepts in Software SafetyConcepts in Software Safety
Concepts in Software Safetydalesanders
 
Japan Travel Guide: Tokyo, Kyoto Itinerary
Japan Travel Guide: Tokyo, Kyoto ItineraryJapan Travel Guide: Tokyo, Kyoto Itinerary
Japan Travel Guide: Tokyo, Kyoto ItinerarySalie Lim
 
Smart material presentation
Smart material presentationSmart material presentation
Smart material presentationyogesh meenA
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issuesommerville-videos
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causessommerville-videos
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecuritysommerville-videos
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causessommerville-videos
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecuritysommerville-videos
 
Introduction to systems of systems
Introduction to systems of systemsIntroduction to systems of systems
Introduction to systems of systemssommerville-videos
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issuesommerville-videos
 

Destacado (20)

System dependability
System dependabilitySystem dependability
System dependability
 
Critical systems engineering
Critical systems engineeringCritical systems engineering
Critical systems engineering
 
Architectural patterns for real-time systems
Architectural patterns for real-time systemsArchitectural patterns for real-time systems
Architectural patterns for real-time systems
 
Ariane 5 launcher failure
Ariane 5 launcher failure Ariane 5 launcher failure
Ariane 5 launcher failure
 
System security
System securitySystem security
System security
 
Concepts in Software Safety
Concepts in Software SafetyConcepts in Software Safety
Concepts in Software Safety
 
Japan Travel Guide: Tokyo, Kyoto Itinerary
Japan Travel Guide: Tokyo, Kyoto ItineraryJapan Travel Guide: Tokyo, Kyoto Itinerary
Japan Travel Guide: Tokyo, Kyoto Itinerary
 
Smart material presentation
Smart material presentationSmart material presentation
Smart material presentation
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issue
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causes
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurity
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causes
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurity
 
Infrastructure dependability
Infrastructure dependabilityInfrastructure dependability
Infrastructure dependability
 
Risk Mitigation for Highway and Railway Bridges
Risk Mitigation for Highway and Railway BridgesRisk Mitigation for Highway and Railway Bridges
Risk Mitigation for Highway and Railway Bridges
 
Critical Systems
Critical SystemsCritical Systems
Critical Systems
 
Infrastructure control
Infrastructure controlInfrastructure control
Infrastructure control
 
Introduction to systems of systems
Introduction to systems of systemsIntroduction to systems of systems
Introduction to systems of systems
 
Maroochy water breach
Maroochy water breachMaroochy water breach
Maroochy water breach
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issue
 

Similar a System safety

Software Engineering - Ch3
Software Engineering - Ch3Software Engineering - Ch3
Software Engineering - Ch3Siddharth Ayer
 
Software Engineering - Ch9
Software Engineering - Ch9Software Engineering - Ch9
Software Engineering - Ch9Siddharth Ayer
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded SystemsMEN Micro
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded SystemsMEN Mikro Elektronik GmbH
 
5 - Safety - Critical Systems.pdf
5 - Safety - Critical Systems.pdf5 - Safety - Critical Systems.pdf
5 - Safety - Critical Systems.pdfFelixKipyego1
 
Dependability requirements for LSCITS
Dependability requirements for LSCITSDependability requirements for LSCITS
Dependability requirements for LSCITSIan Sommerville
 
Depandability in Software Engineering SE16
Depandability in Software Engineering SE16Depandability in Software Engineering SE16
Depandability in Software Engineering SE16koolkampus
 
Vijeo citect quick start tutorial - part 1 ver d
Vijeo citect   quick start tutorial - part 1 ver dVijeo citect   quick start tutorial - part 1 ver d
Vijeo citect quick start tutorial - part 1 ver dAbdul Budiman
 
Cybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurityCybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecuritysommerville-videos
 
Computer security overview
Computer security overviewComputer security overview
Computer security overviewCAS
 
CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013Ian Sommerville
 
Ch14 - Resilience Engineering
Ch14 - Resilience EngineeringCh14 - Resilience Engineering
Ch14 - Resilience EngineeringHarsh Verdhan Raj
 

Similar a System safety (20)

Software Engineering - Ch3
Software Engineering - Ch3Software Engineering - Ch3
Software Engineering - Ch3
 
Software Engineering - Ch9
Software Engineering - Ch9Software Engineering - Ch9
Software Engineering - Ch9
 
Ch12 safety engineering
Ch12 safety engineeringCh12 safety engineering
Ch12 safety engineering
 
Ch12 - Safety Engineering
Ch12 - Safety EngineeringCh12 - Safety Engineering
Ch12 - Safety Engineering
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems
 
Critical systems intro
Critical systems introCritical systems intro
Critical systems intro
 
5 - Safety - Critical Systems.pdf
5 - Safety - Critical Systems.pdf5 - Safety - Critical Systems.pdf
5 - Safety - Critical Systems.pdf
 
Dependability requirements for LSCITS
Dependability requirements for LSCITSDependability requirements for LSCITS
Dependability requirements for LSCITS
 
Depandability in Software Engineering SE16
Depandability in Software Engineering SE16Depandability in Software Engineering SE16
Depandability in Software Engineering SE16
 
Vijeo citect quick start tutorial - part 1 ver d
Vijeo citect   quick start tutorial - part 1 ver dVijeo citect   quick start tutorial - part 1 ver d
Vijeo citect quick start tutorial - part 1 ver d
 
Availability and reliability
Availability and reliabilityAvailability and reliability
Availability and reliability
 
Cybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurityCybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurity
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Ch12
Ch12Ch12
Ch12
 
Ch3
Ch3Ch3
Ch3
 
Ch3
Ch3Ch3
Ch3
 
CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013
 
Ch14 - Resilience Engineering
Ch14 - Resilience EngineeringCh14 - Resilience Engineering
Ch14 - Resilience Engineering
 
Ch14 resilience engineering
Ch14 resilience engineeringCh14 resilience engineering
Ch14 resilience engineering
 

Más de sommerville-videos

Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems scriptsommerville-videos
 
System of systems classification
System of systems classificationSystem of systems classification
System of systems classificationsommerville-videos
 
Agile methods for large systems
Agile methods for large systemsAgile methods for large systems
Agile methods for large systemssommerville-videos
 
Agile and plan based development processes
Agile and plan based development processesAgile and plan based development processes
Agile and plan based development processessommerville-videos
 
Fundamental software engineering activities
Fundamental software engineering activitiesFundamental software engineering activities
Fundamental software engineering activitiessommerville-videos
 
Introducing Software Engineering
Introducing Software EngineeringIntroducing Software Engineering
Introducing Software Engineeringsommerville-videos
 
Stakeholders, viewpoints and concerns
Stakeholders, viewpoints and concernsStakeholders, viewpoints and concerns
Stakeholders, viewpoints and concernssommerville-videos
 
Requirements engineering processes
Requirements engineering processesRequirements engineering processes
Requirements engineering processessommerville-videos
 
Requirements engineering challenges
Requirements engineering challengesRequirements engineering challenges
Requirements engineering challengessommerville-videos
 
Introducing sociotechnical systems
Introducing sociotechnical systemsIntroducing sociotechnical systems
Introducing sociotechnical systemssommerville-videos
 

Más de sommerville-videos (20)

Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems script
 
System of systems classification
System of systems classificationSystem of systems classification
System of systems classification
 
Reuse landscape
Reuse landscapeReuse landscape
Reuse landscape
 
Scaling agile
Scaling agileScaling agile
Scaling agile
 
Agile methods for large systems
Agile methods for large systemsAgile methods for large systems
Agile methods for large systems
 
User stories
User storiesUser stories
User stories
 
Agile and plan based development processes
Agile and plan based development processesAgile and plan based development processes
Agile and plan based development processes
 
Fundamental software engineering activities
Fundamental software engineering activitiesFundamental software engineering activities
Fundamental software engineering activities
 
Introducing Software Engineering
Introducing Software EngineeringIntroducing Software Engineering
Introducing Software Engineering
 
Why se script
Why se scriptWhy se script
Why se script
 
Airbus Flight Control System
Airbus Flight Control SystemAirbus Flight Control System
Airbus Flight Control System
 
Warsaw airbus accident
Warsaw airbus accidentWarsaw airbus accident
Warsaw airbus accident
 
Stakeholders, viewpoints and concerns
Stakeholders, viewpoints and concernsStakeholders, viewpoints and concerns
Stakeholders, viewpoints and concerns
 
Requirements engineering processes
Requirements engineering processesRequirements engineering processes
Requirements engineering processes
 
Requirements engineering challenges
Requirements engineering challengesRequirements engineering challenges
Requirements engineering challenges
 
Intro to requirements eng.
Intro to requirements eng.Intro to requirements eng.
Intro to requirements eng.
 
Emergent properties
Emergent propertiesEmergent properties
Emergent properties
 
Introducing sociotechnical systems
Introducing sociotechnical systemsIntroducing sociotechnical systems
Introducing sociotechnical systems
 
System success and failure
System success and failureSystem success and failure
System success and failure
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 

Último

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Último (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

System safety

  • 2. Safety • Safety is a property of a system that reflects the system’s ability to operate, normally or abnormally, without danger of causing human injury or death and without damage to the system’s environment. System safety, 2013 Slide 2
  • 4. Safety criticality • Primary safety-critical systems – Embedded software systems whose failure can cause the associated hardware to fail and directly threaten people. System safety 2013 Slide 4
  • 6. • Secondary safety-critical systems – Systems whose failure results in faults in other (socio-technical) systems, which can then have safety consequences. – For example, a medical records system is safetycritical as failure may lead to inappropriate treatment being prescribed. System safety 2013 Slide 6
  • 8. Safety and reliability • Safety and reliability are related but distinct • For a system to be safe, it must generally be reliable • However, this is not enough. It must also be safe in the event of system failure System safety 2013 Slide 8
  • 9. • Reliability is concerned with conformance to a given specification and delivery of service • Safety is concerned with ensuring system cannot cause damage irrespective of whether or not it conforms to its specification System safety 2013 Slide 9
  • 10. • A reliable system can be unsafe if the requirements are incorrect or incomplete System safety 2013 Slide 10
  • 11. Unsafe reliable systems The software on this plane operated ‘reliably’ yet the plane crashed- covered in a separate video System safety 2013 Slide 11
  • 12. Unsafe reliable systems • There may be dormant faults in a system that are undetected for many years and only rarely arise. • Specification errors – If the system specification is incorrect then the system can behave as specified but still cause an accident. System safety 2013 Slide 12
  • 13. • Hardware failures generating spurious inputs – Hard to anticipate in the specification. • Context-sensitive commands i.e. issuing the right command at the wrong time – Often the result of operator error. System safety 2013 Slide 13
  • 14. Accident • An unplanned event or sequence of events which results in human death or injury, damage to property, or to the environment. • An overdose of insulin by a softwarecontrolled insulin injection system is an example of an accident. System safety 2013 Slide 14
  • 15. Hazard • A condition with the potential for causing or contributing to an accident. A failure of the sensor that measures blood glucose is an example of a hazard. System safety 2013 Slide 15
  • 16. Damage • A measure of the loss resulting from a mishap. Damage can range from many people being killed as a result of an accident to minor injury or property damage. • Damage resulting from an overdose of insulin could be serious injury or the death of the user of the insulin pump. System safety 2013 Slide 16
  • 17. Safety critical systems development • Hazard avoidance – The system is designed so that some classes of hazard simply cannot arise. System safety 2013 Slide 17
  • 18. • Hazard detection and removal – The system is designed so that hazards are detected and removed before they result in an accident. System safety 2013 Slide 18
  • 19. • Damage limitation – The system includes protection features that minimise the damage that may result from an accident. System safety 2013 Slide 19
  • 20. Summary • Safety is a property of a system that reflects the system’s ability to operate, normally or abnormally, without danger of causing human injury or death. • Safety and reliability are related but reliable systems may be unsafe. System safety 2013 Slide 20
  • 21. Summary • Hazards are conditions that may (but need not) lead to an accident • Safety is achieved through – Hazard avoidance – Hazard detection and removal – Damage limitation System safety 2013 Slide 21